Penetration testing

A product or service for an authorized attempt to bypass the means of protecting the information system. The result of the test is a report that can / must contain a list of detected vulnerabilities, used attack vectors, achieved results, recommendations for correction.